Internet Governance 49
AfrISPA (2002) The halfway proposition: Background paper on reverse subsidy of G8 countries by African ISPs, presented at the Conference of African Ministers of Finance, Planning and Economic Development, Johannesburg, South Africa, 19 October 2002. Available at: http://www.wougnet.org/WSIS/ug/WSIS2005/docs/ HalfwayProposition_Draft4.pdf
50
For a comprehensive survey of interconnection costs, see: Esmat B, Fernandez J (2006) International Internet Connections Costs, in Drake WJ (2006) Reforming Internet Governance: Perspectives from the Working Group on Internet Governance (WGIG). WGIG: New York, NY, USA, pp. 73–86. Available at: http://www.wgig.org/book-Launch.html
51
You can find a comprehensive analysis of the topic in Jensen M (2005) Interconnection Costs. APC: Melville, South Africa. Available at: http://www.apc.org/en/pubs/issue/ accessibility/all/interconnection-costs
52
Huston (2005) op. cit. pp. 7–9.
53
One of the limitations of negotiating this issue between governments is that most interconnection agreements are concluded between private telecommunication operators. They are often confidential.
54
ACLU White paper (ND) No competition: How monopoly control of the broadband Internet threatens free speech. ACLU: New York, NY, USA.
55
For more information on the ITU Global Cybersecurity Agenda, see: http://www.itu.int/ osg/csd/cybersecurity/gca/
56
The convention text is available at: http://conventions.coe.int/Treaty/en/Treaties/ Html/185.htm
57
The official name of these instruments is the Mutual Legal Assistance in Criminal Matters Treaties (MLATs).
58
The Clipper approach was proposed by the US government back in 1993. At its core was the use of a Clipper chip which was supposed to be used in all telephones and other voice communication tools. The Clipper chip had a ‘back door’ which could be used by governments for lawful surveillance. After strong opposition from human rights activists and the general public, the US government dropped this proposal in 1995. See: Denning D (1995) The case for clipper. MIT Technology Review. MIT: Cambridge, MA, USA. Available at: http://encryption_policies.tripod.com/us/denning_0795_clipper.htm
59
More references to Can-Spam are available at: http://www.ftc.gov/bcp/edu/pubs/ business/ecommerce/bus61.shtm
60
The Contact Network of Spam Enforcement Authorities (CNSA) was established in February 2005 by 13 EU countries (France, Austria, Belgium, Cyprus, the Czech Republic, Denmark, Greece, Ireland, Italy, Lithuania, Malta, the United Kingdom, and Spain). It aims to promote both cooperation among these states and coordination with entities outside the EU, such as the OECD and ITU.
61
European Commission, Information Society (2010). Unsolicited communication: fighting spam. Available at: http://ec.europa.eu/information_society/policy/ecomm/todays_ framework/privacy_protection/spam/index_en.htm
78